{"id":"USN-7906-3","summary":"linux-raspi vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - x86 architecture;\n  - Cryptographic API;\n  - Android drivers;\n  - TTY drivers;\n  - F2FS file system;\n  - 9P file system network protocol;\n(CVE-2025-40025, CVE-2025-40026, CVE-2025-40027, CVE-2025-40028,\nCVE-2025-40108, CVE-2025-40109)\n","modified":"2026-02-10T04:50:37Z","published":"2025-12-11T19:31:56Z","related":["UBUNTU-CVE-2025-40025","UBUNTU-CVE-2025-40026","UBUNTU-CVE-2025-40027","UBUNTU-CVE-2025-40028","UBUNTU-CVE-2025-40108","UBUNTU-CVE-2025-40109"],"upstream":["CVE-2025-40025","CVE-2025-40026","CVE-2025-40027","CVE-2025-40028","CVE-2025-40108","CVE-2025-40109","UBUNTU-CVE-2025-40025","UBUNTU-CVE-2025-40026","UBUNTU-CVE-2025-40027","UBUNTU-CVE-2025-40028","UBUNTU-CVE-2025-40108","UBUNTU-CVE-2025-40109"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7906-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40025"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40026"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40027"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40028"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40108"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40109"}],"affected":[{"package":{"name":"linux-raspi","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/linux-raspi@6.17.0-1005.5?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.17.0-1005.5"}]}],"versions":["6.14.0-1005.5","6.17.0-1003.3","6.17.0-1004.4"],"ecosystem_specific":{"binaries":[{"binary_version":"6.17.0-1005.5","binary_name":"linux-buildinfo-6.17.0-1005-raspi"},{"binary_version":"6.17.0-1005.5","binary_name":"linux-headers-6.17.0-1005-raspi"},{"binary_version":"6.17.0-1005.5","binary_name":"linux-image-6.17.0-1005-raspi"},{"binary_version":"6.17.0-1005.5","binary_name":"linux-modules-6.17.0-1005-raspi"},{"binary_version":"6.17.0-1005.5","binary_name":"linux-raspi-headers-6.17.0-1005"},{"binary_version":"6.17.0-1005.5","binary_name":"linux-raspi-tools-6.17.0-1005"},{"binary_version":"6.17.0-1005.5","binary_name":"linux-tools-6.17.0-1005-raspi"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7906-3.json","cves_map":{"cves":[{"id":"CVE-2025-40025","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-40026","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-40027","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-40028","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-40108","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-40109","severity":[{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:25.10"}}}],"schema_version":"1.7.3"}